APPARATUS AND METHOD FOR TYING CYBER-SECURITY RISK ANALYSIS TO COMMON RISK METHODOLOGIES AND RISK LEVELS
First Claim
1. A method comprising:
- identifying, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks;
identifying, by the risk manager system, cyber-security risks in the connected devices;
assigning, by the risk manager system, a risk level to each of the identified cyber-security risks;
for each identified cyber-security risk, comparing by the risk manager system the assigned risk level to a first threshold and to a second threshold;
based on the comparisons, assigning, by the risk manager system, each identified cyber-security risk to a risk classification; and
displaying, by the risk manager system, a user interface that includes a notification according to the identified cyber-security risks and the corresponding assigned risk classifications.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure provides systems and methods for tying cyber-security risk analysis to common risk methodologies and risk levels. A method includes identifying a plurality of connected devices that are vulnerable to cyber-security risks and identifying cyber-security risks in the connected devices. The method includes assigning a risk level to each of the risks and comparing the risk levels to a first threshold and to a second threshold. The method includes assigning each identified cyber-security risk to a risk classification and displaying a user interface that includes a notification according to the identified cyber-security risks and the corresponding assigned risk classifications.
16 Citations
20 Claims
-
1. A method comprising:
-
identifying, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks; identifying, by the risk manager system, cyber-security risks in the connected devices; assigning, by the risk manager system, a risk level to each of the identified cyber-security risks; for each identified cyber-security risk, comparing by the risk manager system the assigned risk level to a first threshold and to a second threshold; based on the comparisons, assigning, by the risk manager system, each identified cyber-security risk to a risk classification; and displaying, by the risk manager system, a user interface that includes a notification according to the identified cyber-security risks and the corresponding assigned risk classifications. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A risk manager system comprising:
-
a controller; and a display, the risk manager system configured to identify a plurality of connected devices that are vulnerable to cyber-security risks; identify cyber-security risks in the connected devices; assign a risk level to each of the identified cyber-security risks; for each identified cyber-security risk, compare the assigned risk level to a first threshold and to a second threshold; based on the comparisons, assign each identified cyber-security risk to a risk classification by the risk manager system; and display a user interface that includes a notification according to the identified cyber-security risks and the corresponding assigned risk classifications. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium encoded with executable instructions that, when executed, cause one or more processors of a risk manager system to:
-
identify a plurality of connected devices that are vulnerable to cyber-security risks; identify cyber-security risks in the connected devices; assign a risk level to each of the identified cyber-security risks; for each identified cyber-security risk, compare the assigned risk level to a first threshold and to a second threshold; based on the comparisons, assign each identified cyber-security risk to a risk classification by the risk manager system; and display a user interface that includes a notification according to the identified cyber-security risks and the corresponding assigned risk classifications. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification